Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain. Think about how many small businesses, suppliers...

Year after year, cyber threats continue to increase in both sophistication and frequency. One reason that data breaches are occurring is that passwords are created by people to identify themselves for multiple applications - from online banking accounts to a shopping site - and these passwords are valuable to...

Many organizations lack an effective defense against the multiple attack vectors cybercriminals use to target employees, compromise their devices, and gain access to enterprise networks and resources. The attack vectors are many and varied, from credentials theft, exploitation of application vulnerabilities and...

Despite taking significant steps to strengthen their cybersecurity, banks and other financial services (FS) organizations will
continue to be challenged by the speed of technological change and the sophisticated
nature of cyber threats.
Larger FS organizations who want to stay ahead of cyber criminals and reduce...

Attackers are leaving no stone unturned, prying into web applications, operating systems and even deeper in the hardware. They're taking advantage of conventional endpoints and mobile devices, slipping past and through network security, and even taking advantage of the human element operating the devices.
In this...

Our world has been radically transformed by digital technology - smart phones, tablets, and web-enabled devices have altered our daily lives, including the way we do commerce and manage our finances. At the same time, technology has enabled a new generation of criminals to gain access to information...

In 2013 much attention was focused on cyber-espionage, threats to privacy and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging threats from cybercriminals continue to loom over businesses and consumers. Eight breaches in 2013 each...

Businesses are at war with hackers. It is vital that all businesses incorporate a reliable projection system that constantly updates and looks for new threats to achieve the best defense possible against attackers. With attacks becoming more common, more serious and harder to detect, traditional antivirus software...

The largest data breach reported in June resulted in the exposure of 1.3 million identities. This seems like a small number when compared to the 145 million exposed in the largest breach of May. However, while reported in June, this breach also took place during the month of May. This brings the total number of...

A cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities...

The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
This analysis provides:
An evaluation of...

Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations...

Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches.
This whitepaper discusses:
The growth of mobile devices in the workplace;
Inherent...

All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.